Results 41 to 50 of about 3,158,126 (357)
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core +2 more sources
Authenticity in Criminal Law, Criminalistics and Forensic Science
The authenticity of products, documents and some other objects is of paramount importance in all areas of human activity. Illicit manufacturing of the counterfeit goods, documents, money, and a number of other objects entails legal liability, including criminal.The questions about authenticity are commonly put before experts when appointing several ...
A. Y. Asnis, S. N. Khaziev
openaire +2 more sources
Verification of considered cause (ta’līl al-ahkām) together with the objectives of Shariah (maqāsid al-Sharī’ah) is among the most important issues discussed by the experts of Jurisprudence. This article analyses the procedures of establishing causes for
Zuhrotul Aini Mansur
doaj +1 more source
Authentication with Distortion Criteria [PDF]
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks.
Chen, Brian +2 more
core +2 more sources
Verification of considered cause ( ta'lil al-ahkiim) together with the objectives of Shariah (maqiisid al-Shari'ah) is among the most important issues discussed by the experts of Jurisprudence.
Zuhrotul Ain Mansur
doaj +1 more source
Detection of replay attacks in cyber-physical systems using a frequency-based signature [PDF]
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop ...
Escobet Canal, Teresa +5 more
core +2 more sources
PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj +1 more source
Wood identification services in support of legal supply chains: A market study
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen +2 more
doaj +1 more source
The Concept of Rights: Views of Bentham and Khoei [PDF]
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj +1 more source
Probability on groups and an application to cryptography [PDF]
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye +2 more
doaj

